SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does it mean to Extend a Basic Disk Volume?
You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume - it must be raw or formatted with the NTFS file system.
It is a advertisement of a service. The record is configured with the service provided - a port number and weight?
Clicking and dragging a window to the right or left side of the desktop causes the window to fill the respective half of the screen. Snapping a window to the top of the desktop maximizes it. Resizing a window to touch the top or bottom edge of the sc
No
2. What does DRIVERQUERY /SI do?
It will display driver signing status
It which enables content from file and Web servers on a wide area network (WAN) to be cached on computers at a local branch office. BranchCache can improve application response time and reduce WAN traffic. Cached content can either be distributed acr
Export and import it from another computer.
Internet Protocol security (IPsec) and Internet Protocol version 6 (IPv6).
3. What OSs disallow the uninstalliatin of IPV6?
Sett up a priority for the preferred smtp server.
DNS suffix search lists
You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume - it must be raw or formatted with the NTFS file system.
Windows Vista - Window 7 and Server 2008.
4. How do you setup a remote site that resolves names even when there is no connectivity to the main site?
A processor that supports the hardware virtualization using either the AMD-V or Intel VT options. 256MB of RAM is dedicated to the XP client so the Windows 7 computer should have at least 2GB of overall RAM. Windows XP Mode is only available in Windo
It can speed up your computer by using storage space on most USB flash drives and flash memory cards. ReadyBoost is designed to help when your PC's memory is running low. Low memory can make your computer sluggish because Windows - which needs a plac
Deploy a secondary zone.
DHCP server cannot assign an ip address
5. What does "wbdadmin -startbackup -allcritical" do?
Conditional forward
Backups of the full system including all critical volumes (volumes that contain operating system state).
To will ensure the clients download the appropriate printer driver.
DNS suffix search lists
6. Where is ageing configured?
The domain profile not the public or private.
The first time a user opens a file in a shared folder - Windows 7 reads the file from the server and then stores it in a cache on the computer's hard disk drive. The second and subsequent times a user reads the same file - Windows 7 retrieves the cac
On the zone file of the DNS server in the DNS manager.
Default Programs Control Panel applet
7. What does the WSUS DB Store?
It designates an authoritative DNS server - not the soa record.
WSUS server configuration information - Metadata describing what each update is for - and general information about clients - updates and interaction.
Use the Programs and Features Control Panel applet to
EARLY CHILDHOOD - EVERYONE - EVERYONE 10+ - TEEN - MATURE - ADULTS ONLY - RATING PENDING
8. How many bits are in the site prefix?
A scheduled task that runs by default collecting information for the Reliability monitor. If disabled it must reenabled manually from the task scheduler mmc snapin.
Run scripts
Sett up a priority for the preferred smtp server.
4 (bits 53 - 56) /56 Allows for 16 regions
9. How can Transparent Caching is be enabled?
You add it back to a DNS zone - clear the server DNS cache and clients DNS cache.
An authentication method that completes user authentication before you establish a full Remote Desktop connection and the logon screen appears. This can help protect the remote computer from hackers and malicious software.
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
Duplicate file identification - disk usage patterns - dormant files identification - and audit screening.
10. What does Parental Controls do?
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
Restrict when a child can logon to a computer.
Place unhealthy computers in a quarantined network and auto-remediate clients.
A new feature for Offline Files & Folders. Prior to Windows 7 - to open a file across a slow network - client computers always retrieved the file from the server - even if the client computer had recently read the file. With Windows 7 transparent cac
11. What does DISM /Get-Drivers do?
Used to get a list of installed 3rd party drivers
If your computer is running slowly or isn't working properly - you can use System Restore to return your computer's system files and settings to an earlier point in time using a restore point. For more information about System Restore - see System Re
By running the Update Status summary report.
It can add a driver to an offline WIM image with the /Add-Driver option
12. What requirements needs to be met to use network level authentication?
Client needs Remote Desktop Connection 6.0 or above - Client must use an os that supports CredSSP (Credential Security Support Providoer) - The terminal server must user windoes 2008 and above.
By creating or modifying a wireless connection in Network and Sharing Center.
Extensive Authentication Protocol used in PPP authentication.
It is the max size is expressed in megabytes.
13. What does the Windows 7 Upgrade Advisor do?
Not supported
It sees if your PC is ready for Windows 7. It scans your hardware - devices - and installed programs for known compatibility issues - gives you guidance on how to resolve potential issues found - and recommends what to do before you upgrade.
It create a report of which files will be migrated
Yes
14. What should you modify of the NAP Agent client service if the computer needs to prove health status?
Configure a firewall rule to the specific port and block all connections.
Either from wbadmin or windows server backup.
Modify the PE image using DISM by adding the WINPE-Scripting package to BOOT.WIM
Modify the service startup to automatic and also enable the proper NAP enforcement client (DHCP - EAP - RDGATEWAY - IPSEC).Configured for manual start by default.
15. Can you choose which media libraries you want to share with your homegroup?
Installing and imaging on hardware agnostic systems as long as the processor architecture is the same (32 or 64 bit)
It is a command-line tool which relies on Windows Remote Management (WinRM) to execute remote commands. The basic syntax for WinRS commands is as follows: winrs -r:target command - where target is the name (NetBIOS or FQDN) of the remote computer tha
Windows XP and Server 2003.
Yes
16. How do you configure IPSEC?
Assign a ipsec policy to all computers - verify the computers can manually authenticate. Assign a client respond only IPSEC policy to the computers. Also either the request server or the security server need IPSEC polices assigned.
The command used to preform an offline defrag. Example: jetpack DHCP.mdb temp.mdb
8 (bits 57 - 64) /64 Allows for 256 subnets in each site.
It will display driver signing status
17. What OS can Applocker policies not be enforced?
Install NAP on the computer with the DHCP service.Configure NAP as a RADIUS proxy and forward connection requests to the RADIUS server.
L2TP/IPSEC with EAP-TLS.
Windows PE and Windows.old.
Windows 7 Professional.
18. What port does RDP use?
Adds a file based zone
3389
Specify this file with both the ScanState and LoadState commands to migrate user folders - files - and file types to computers running Windows Vista or Windows 7.
By unbinding the DHCP protocol from the nic attached to the subnet.
19. What is Touch UI?
WPA2 and 802.1x but require EAP-TLS to be enable.
Windows Aero was revised to be more touch-friendly.
Only a local administrator
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
20. What does the MigApp.xml file do?
Specify this file with both the ScanState and LoadState commands to migrate application settings to computers running Windows Vista or Windows 7.
Enterprise Admins
Encapsulating Security payload protocol used for encryption the packets created by the AH.
Send email notifications
21. What drive is System protection is automatically setup on?
You start by selecting Windows XP Mode from the Windows 7 Start Menu. You can install applications in Windows XP Mode just as you normally would on a physical PC. For example - you can install applications via web - from storage devices - or from phy
To another hard disk in the same computer - network or to removable media.
DHCPv6 obtains additional configuration settigns.
For the drive that Windows is installed on. System protection can only be turned on for drives that are formatted using the NTFS file system.
22. What is Bootsect.exe?
Set IE back to its default settings
Windows 7 Ultimate.
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
Updates the master boot code for hard disk partitions to switch between BOOTMGR and NTLDR. You can use this tool to restore the boot sector on your computer. This tool replaces FixFAT and FixNTFS.
23. What service has to be started for Applocker to work?
By coping the application compatibility database to a network location and run a logon script that includes SDBInst on each computer - specifying the UNC path of the file.
Vista SP1 and Server 2008 and above.
A processor that supports the hardware virtualization using either the AMD-V or Intel VT options. 256MB of RAM is dedicated to the XP client so the Windows 7 computer should have at least 2GB of overall RAM. Windows XP Mode is only available in Windo
The Application Identity Service
24. What is Network Level Authentication?
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
An authentication method that completes user authentication before you establish a full Remote Desktop connection and the logon screen appears. This can help protect the remote computer from hackers and malicious software.
Run: Cscript slmgr.vbs /dl
Adds a file based zone
25. How do you calculate the original subnet mask of a network that was divided in to multiple networks?
All Programs - Windows Virtual PC - Windows XP Mode Applications. To run your application directly from the Windows 7 desktop - just go to your Start menu.
Attach to the VHD file created by Windows Backup. You can attach to a VHD file using Disk Management or DISKPART
Take the number of networks and take the square root of it. Subtract that number from the subnet mask. The result is the original mask.
A LAN Router only or a LAN to WAN Router
26. What do DFS nameservers need to do to obtain the most current namespace data?
Boot to a Windows 7 setup DVD and run System Restore or boot to a System Repair Disk.
Pool Active Directory.
Place unhealthy computers in a quarantined network and auto-remediate clients.
Use the BCDEDIT.EXE command
27. What does IP Helper service has to run for?
Credentials - such as user names and passwords that you use to log on to websites or other computers on a network. By storing your credentials - Windows can automatically log you on to websites or other computers. Credentials are saved in special fol
IPV6 transition technologies
Sent across the network
They are written in XML and be created using the Windows System Image Manager or a text editor like notepad.
28. What is a ns record?
It designates an authoritative DNS server - not the soa record.
Delete all the zone files or reinstall the DNS service.
Adds a file based zone
It makes it easy to share your libraries and printers on a home network. You can share pictures - music - videos - documents - and printers with other people in your homegroup. The homegroup is protected with a password - and you'll always be able to
29. How can you communicate accross the IPV6 accross a IPV4 network?
ISATAP Routers within an orginization - 6TO4 routers to transverse the internet - and TEREDO to traverse a NAT devise.
You can add more space to existing primary partitions and logical drives by extending them into adjacent unallocated space on the same disk. To extend a basic volume - it must be raw or formatted with the NTFS file system.
To display friendly labels to capture packet address headers.
Command to configure the TCP/IP settings.
30. What does DISM do?
WINRM QUICKCONFIG.
It is a temporary wireless profile that doesn't validate the certificate of the remote authentication dial-in user service (RADIUS) server.
It can add a driver to an offline WIM image with the /Add-Driver option
Adds a file based zone
31. Can DISM can apply an answer file to an offline image?
dynamic drives
It makes it easy to share your libraries and printers on a home network. You can share pictures - music - videos - documents - and printers with other people in your homegroup. The homegroup is protected with a password - and you'll always be able to
The Deployment Image Servicing and Management (DISM) tool replaces the pkgmgr - PEImg - and IntlConfg tools that are being retired in Windows 7. DISM provides a single centralized tool for performing all of the functions of these three tools in a mor
Yes
32. What does Microsoft Transform files (MST) do?
Modifies the installation of a Windows Installer Package (.MSI) and can be invoked with MSIEXEC.EXE
Modify the PE image using DISM by adding the WINPE-Scripting package to BOOT.WIM
By using the DISM command with a /Set-Edition option: Example: DISM /IMAGE:C:SAMPLE.WIM /Set-Edition:Ultimate
Yes
33. What is a reservation?
A way of assigning a staic address based on the mac address. This ensures each time the client receives the same address.
It insert drivers into the Windows Driver Store so that users can add the associated PNP hardware without having to provide the driver or administrator credentials
You create an answer file and place it on removable media. By default - Windows Setup will search the root directory of all removable media for an answer file called Autounattend.xml.
Use the Programs and Features Control Panel applet to
34. How can you removed a stale resource record from DNS?
SSL
Specified the version identifer of the back to recover in MM?DD/YYYY-HH:MM format. If the version is unknown wdadmin will get the version.
Configure aging and scavenging.
IPSEC
35. How do you restore a System Image from backup?
Boot to a Windows 7 setup DVD and run System Restore or boot to a System Repair Disk.
Using wecutil -cs in an xml file.
Enabled searching for content on remote locations right from the Explorer itself. Integrating federated search into Windows gives users the benefits of using familiar tools and workflows to search remote data. This enhanced integration provides the a
Export and import it from another computer.
36. What does User Rights policy governs?
Who can shutdown a computer
You need to specify the files on both command lines using the /i option. Unlike previous versions of USMT - the .xml files are not copied to the store. Because ScanState and LoadState need the .xml files to control the migration - you should specify
L2TP uses IPSEC to encrypt VPN traffic - PKI is needed to issue certificates that are required by IPSEC.
Yes
37. What do you provide to Scanstate to prevent certain system settings from being migrated?
Tools adds out-of-box drivers to a booted Windows PE image. It takes one or more driver .inf files as inputs.
A CONFIG.XML file
Send email notifications
Use WPA with AES encryption. WPA-Personal requires a preshared key and WPA-Enterprise uses Radius Authentication.
38. What does MISEXEC.EXE do?
Windows Vista - Window 7 and Server 2008.
Install Windows Installer Packages (.MSI) files. You can script the installation.
Either by placing data on a web server and enforcing ssl to be used to download or by using IPSEC on a file share.
Can be configured through a GPO
39. How do you configure WSUS computer groups for defined updates?
You will need to run "Startup Repair" from within the Windows Recovery Environment (WRE)
By using the dnscmd /zoneexport command.
It can add a driver to an offline WIM image with the /Add-Driver option
By either using WSUS management console (server side targeting) or GPO (client side targeting).
40. How can you use ImageX to apply a WIM Image directly to a VHD file?
ImageX utility can extract the required operating system edition directly to the attached VHD file in Windows 7.
Take the number of networks and take the square root of it. Subtract that number from the subnet mask. The result is the original mask.
The system will shut down. The next time you start this system (after cloning it) - it will install with the settings in the XML file. The Computer Name will be automatically generated.
Encapsulating Security payload protocol used for encryption the packets created by the AH.
41. How do you create a subscription?
Computer certificates be installed on client computers
Using wecutil -cs in an xml file.
vssadmin.exe. This can view previous version files as well.
Some information—such as cookies and temporary Internet files—so that the webpages you visit will work correctly. However - at the end of your InPrivate Browsing session - this information is discarded.
42. What does importing and exporting rules affect?
Used to control power settings and configure computers to default to Hibernate or Standby modes. For example - running Powercfg.exe -energy will analyze the computer for energy efficiency.
The import and export affects the entire policy. For example - if you export a policy - all of the rules from all of the rule collections are exported - including the enforcement settings for the rule collections. If you import a policy - the existin
It improves performance
Delegate permission by configuring the dacl of the zone file.
43. How do you calculate the number of host addresses in a give subnet?
Default Programs Control Panel applet
Subtract the number of bits in the mask from 32 bits (255.255.255.255). Take the result (x) and have 2 to the power of the result (2^x). Subtract that final result by 2 and that is the amount of host addresses available.
Disable AutoComplete in Internet Explorer
It makes it easy to share your libraries and printers on a home network. You can share pictures - music - videos - documents - and printers with other people in your homegroup. The homegroup is protected with a password - and you'll always be able to
44. What are WIM files used for?
Not supported
Also known as root scalability mode. Allows organizations with more than 16 namespace servers use consistency mode. They poll the nearest dc every hour instead of the pdc emulator. This reduces network traffic to the pdc emulator but clients might ha
Installing and imaging on hardware agnostic systems as long as the processor architecture is the same (32 or 64 bit)
IPV4 and IPV6
45. How do you repartition your hard disk by using the Shrink feature in Disk Management?
Us edit dnscmd /zoneupdatefromdns command.
If you are logged in as an administrator you can shrink an existing partition or volume to create unallocated disk space - from which you can create a new partition or volume. You can shrink a volume even on a Basic Disk.
So the downstream servers can recieve its approved updates via parent server. This allows multiple points of deployment. Downstream servers also can be delegated the permission to approve their own updates
Use AD integrated zones so the clients can update to more than one DNS server.
46. What do wireless access points need in order for NAP to enforce wireless access policy (WAP)?
WPA-Enterprise (radius authentication)
ImageX utility can extract the required operating system edition directly to the attached VHD file in Windows 7.
It create a report of which files will be migrated
They need to be configured us use 802.1x RADIUS authentication
47. What is BCD?
8 (bits 57 - 64) /64 Allows for 256 subnets in each site.
Modifies the installation of a Windows Installer Package (.MSI) and can be invoked with MSIEXEC.EXE
Specify this file with both the ScanState and LoadState commands to migrate application settings to computers running Windows Vista or Windows 7.
Boot Configuration Database - Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini.
48. What is AppLocker?
For example - you can create a rule that allows all Windows processes to run except Registry Editor (Regedit.exe).
It is the Microsoft SMB client for accessing shared network resources
Plug in the drive and then select properties of the drive. You can make changes through the ReadyBoost tab.
A new feature in Windows 7 and Windows Server 2008 R2 that replaces the Software Restriction Policies (SRP) feature. One of the advantages of Applocker rules over SRP is you can assign a rule to a security group or an individual user.
49. What OSs are all Windows Games installed on?
driveletter:\\WindowsImageBackup\
Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However - it does not find and migrate any application data - program files - or any
Boot the computer with a WINDOWS PE disk that contains a copy of IMAGEX.
Windows 7 Enterprise and Ultimate Editions
50. What does Scanstate /EFS:COPYRAW do?
driveletter:\\WindowsImageBackup\
Cannot be in different domains
Migrates EFS encrypted files?
Modifies the installation of a Windows Installer Package (.MSI) and can be invoked with MSIEXEC.EXE